Analysis
-
max time kernel
9s -
max time network
11s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
14-05-2024 07:37
Behavioral task
behavioral1
Sample
system.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
system.exe
Resource
win7-20231129-en
Behavioral task
behavioral3
Sample
system.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
system.exe
Resource
win11-20240426-en
General
-
Target
system.exe
-
Size
101KB
-
MD5
2b81bc43a5f1578cb4b5e1db7f1cb700
-
SHA1
6e538da119fa2a0e1f594eca3e83cee428e6ea45
-
SHA256
63bafd0c8173000d3d5a1b05e4167f1254f36491758424dc7575fd3bed0ef28d
-
SHA512
0ebe233706dff5778a4ac3a03106df8d5a9ffbfd880b4dfbf02a847a18e112418d46bb04dc1a28a209477d51616b23ab4f2a68bcfa9584d1c001d4a335618483
-
SSDEEP
1536:A8cKWUH40SsmjFAQ4+Mrw1CPof4a30ahkyYyoe5vda/WrQFVwEKwNuyyU3:A8crUHnm6BjAQazY05FaOrQ3wEK2uA
Malware Config
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
system.exepid process 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe 1220 system.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
system.exedescription pid process Token: SeDebugPrivilege 1220 system.exe